From: Brian on
On Wed 04 Aug 2010 at 10:53:42 +0200, Wolodja Wentland wrote:

> chkrootkit - rootkit detector
> rkhunter - rootkit, backdoor, sniffer and exploit scanner

If ckkrootkit really did detect worms like Lupper, Lion
and Adore (as opposed to the false positives both programs
appear fond of generating) the user should take a close
look at the Debian release he is using.

My problem with software like this is that it gives the
impression of providing security over and above what the
normal updating procedure provides.



--
To UNSUBSCRIBE, email to debian-user-REQUEST(a)lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster(a)lists.debian.org
Archive: http://lists.debian.org/20100804142447.GI26887(a)desktop
From: Jordon Bedwell on
On 8/4/2010 9:24 AM, Brian wrote:
> On Wed 04 Aug 2010 at 10:53:42 +0200, Wolodja Wentland wrote:
>
>> chkrootkit - rootkit detector
>> rkhunter - rootkit, backdoor, sniffer and exploit scanner
>
> If ckkrootkit really did detect worms like Lupper, Lion
> and Adore (as opposed to the false positives both programs
> appear fond of generating) the user should take a close
> look at the Debian release he is using.
>
> My problem with software like this is that it gives the
> impression of providing security over and above what the
> normal updating procedure provides.
>
>
>

Because a rootkit can't remain hidden and inject itself back into the
binary after a "security update" right? I mean it's never happened
before, that's why Tripwire doesn't exist...Or because apt does trigger
checks and validates once after the install and then once more a few
minutes later to trigger integrity violations? Or because doing a
security update on grub will remove a rootkit in your system that will
just inject itself back into the boot? All this is just figments of our
imagination and it's impossible for any of this to happen because all
you have to do is apt-get upgrade and you'll be legit.


--
To UNSUBSCRIBE, email to debian-user-REQUEST(a)lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster(a)lists.debian.org
Archive: http://lists.debian.org/4C59829D.1000509(a)envygeeks.com
From: Brian on
On Wed 04 Aug 2010 at 10:09:17 -0500, Jordon Bedwell wrote:

> Because a rootkit can't remain hidden and inject itself back into the
> binary after a "security update" right?

Correct. It wouldn't be there in the first place and I don't plan on
having my root acoount compromised. Besides, I know my system.

I mean it's never happened
> before, that's why Tripwire doesn't exist...Or because apt does trigger
> checks and validates once after the install and then once more a few
> minutes later to trigger integrity violations? Or because doing a
> security update on grub will remove a rootkit in your system that will
> just inject itself back into the boot? All this is just figments of our
> imagination and it's impossible for any of this to happen because all
> you have to do is apt-get upgrade and you'll be legit.

You're speaking hypothetically. When rootkits with these capabilities
exist neither chkrootkit nor rkhunter will detect them. By the time
they get round to it my updates will have brought in the fixes, just
as they did when Lion, which chkrootkit spuriously claims to defend
me against, was about.


--
To UNSUBSCRIBE, email to debian-user-REQUEST(a)lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster(a)lists.debian.org
Archive: http://lists.debian.org/20100804174319.GL26887(a)desktop
From: Nuno Magalhães on
On Wed, Aug 4, 2010 at 18:43, Brian <ad44(a)cityscape.co.uk> wrote:
> Besides, I know my system.

Famous last words... ;)

--
()  ascii-rubanda kampajno - kontraŭ html-a retpoŝto
/\  ascii ribbon campaign - against html e-mail


--
To UNSUBSCRIBE, email to debian-user-REQUEST(a)lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster(a)lists.debian.org
Archive: http://lists.debian.org/AANLkTimKv?C1s1o457XMKdjGSVKnwehaavzMsW72sv(a)mail.gmail.com
From: Eero Volotinen on
2010/8/4 Tingez Unknown <tingez(a)twf-clan.co.uk>:
> Hi all Debian people,
>
> Firstly i am very new to Debian so please excuse me for my lack of
> understanding. I have recently got a Dedicated server box for my gaming Clan
> and have had Debian 5 64bit installed on it. Now as we will eventually be
> using the server for our web site for forums, Emails, sending and receiving
> files and all other aspects web site related, fast redirect downloading
> system for game server maps, mods etc., ftp, Big brother bot game server
> software and game servers of varying games.
>
> I am looking for any suggestions regarding Anti virus and firewall software
> that is suitable with your Debian 5 64bit operating system. Wanting to add
> as much security as possible to our server to reduce any problems we may
> encounter. I would like any suggestions as to the best software that can be
> used either paid for or freeware if you would be so kind.

See CIS instructions for debian, bit old but still working:

http://cisecurity.org/en-us/?route=downloads.show.single.debian.100

--
Eero


--
To UNSUBSCRIBE, email to debian-user-REQUEST(a)lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster(a)lists.debian.org
Archive: http://lists.debian.org/AANLkTi=ygy6fLbkX7iQKgWtiKOaJLHzVv0jw2rurQM7c(a)mail.gmail.com